Follow
Deb Frincke
Deb Frincke
Associate Laboratory Director Sandia National Laboratories, head of National Security Programs
Verified email at sandia.gov
Title
Cited by
Cited by
Year
Smart-grid security issues
H Khurana, M Hadley, N Lu, DA Frincke
IEEE Security & Privacy 8 (1), 81-85, 2010
8282010
Intrusion and misuse detection in large-scale systems
RF Erbacher, KL Walker, DA Frincke
IEEE computer graphics and applications 22 (1), 38-47, 2002
2102002
Combining traditional cyber security audit data with psychosocial data: towards predictive modeling for insider threat mitigation
FL Greitzer, DA Frincke
Insider threats in cyber security, 85-113, 2010
1622010
A framework for cooperative intrusion detection
D Frincke, D Tobin, J McConnell, J Marconi, D Polla
Proc. 21st NIST-NCSC National Information Systems Security Conference, 361-373, 1998
1561998
Integrating security into the curriculum
CE Irvine, SK Chin
Computer 31 (12), 25-30, 1998
1311998
Cost-benefit analysis for network intrusion detection systems
H Wei, D Frinke, O Carter, C Ritter
CSI 28th Annual Computer Security Conference, 29-31, 2001
1202001
Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory
D Yu, D Frincke
Proceedings of the 43rd annual Southeast regional conference-Volume 2, 142-147, 2005
1132005
Concerns about intrusions into remotely accessible substation controllers and SCADA systems
P Oman, E Schweitzer, D Frincke
Proceedings of the Twenty-Seventh Annual Western Protective Relay Conference 160, 2000
1002000
A Theoretical Framework for Organizational Network Forensic Readiness.
B Endicott-Popovsky, DA Frincke, CA Taylor
J. Comput. 2 (3), 1-11, 2007
892007
Improving the quality of alerts and predicting intruder’s next goal with Hidden Colored Petri-Net
D Yu, D Frincke
Computer Networks 51 (3), 632-654, 2007
852007
A multi-phase network situational awareness cognitive task analysis
RF Erbacher, DA Frincke, PC Wong, S Moody, G Fink
Information Visualization 9 (3), 204-219, 2010
782010
A risk management approach to the “insider threat”
M Bishop, S Engle, DA Frincke, C Gates, FL Greitzer, S Peisert, S Whalen
Insider threats in cyber security, 115-137, 2010
712010
Balancing cooperation and risk in intrusion detection
D Frincke
ACM Transactions on Information and System Security (TISSEC) 3 (1), 1-29, 2000
672000
A novel framework for alert correlation and understanding
D Yu, D Frincke
Applied Cryptography and Network Security: Second International Conference …, 2004
642004
Specifying digital forensics: A forensics policy approach
C Taylor, B Endicott-Popovsky, DA Frincke
Digital investigation 4, 101-104, 2007
542007
Predictive modeling for insider threat mitigation
FL Greitzer, P Paulson, L Kangas, LR Franklin, TW Edgar, DA Frincke
Richland, WA: Pacific Northwest National Laboratory, 6-17, 2009
532009
Analysis of an algorithm for distributed recognition and accountability
C Ko, DA Frincke, T Goan Jr, T Heberlein, K Levitt, B Mukherjee, C Wee
Proceedings of the 1st ACM conference on Computer and communications …, 1993
531993
Teaching secure programming
M Bishop, DA Frincke
IEEE security & privacy 3 (5), 54-56, 2005
502005
Social/ethical issues in predictive insider threat monitoring
FL Greitzer, D Frincke, M Zabriskie
Information assurance and security ethics in complex systems …, 2011
482011
Relationships and data sanitization: A study in scarlet
M Bishop, J Cummins, S Peisert, A Singh, B Bhumiratana, D Agarwal, ...
Proceedings of the 2010 New Security Paradigms Workshop, 151-164, 2010
452010
The system can't perform the operation now. Try again later.
Articles 1–20